Search results for: business Chinese
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3971

Search results for: business Chinese

1811 A Framework for Assessing and Implementing Ecological-Based Adaptation Solutions in Urban Areas of Shanghai

Authors: Xin Li

Abstract:

The uncertainty and the complexity of the urban environment combining with the threat of climate change are contributing factors to the vulnerability in multiple-dimensions in Chinese megacities, especially in Shanghai. The urban area occupied high valuable technological infrastructure and density buildings is under the threats of climate change and can provide insufficient ecological service to remain the trade-off on urban sustainable development. Urban ecological-based adaptation (UEbA) combines practices and theoretical work and integrates ecological services into multiple-layers of urban environment planning in order to reduce the impact of the complexity and uncertainty. To understand and to respond to the challenges in the urban level, this paper considers Shanghai as the research objective. It is necessary that its urban adaptation strategies should be reflected and contain the concept and knowledge of EbA. In this paper, we firstly use software to illustrates the visualizing patterns and trends of UEBA research in the current 10 years. Specifically, Citespace software was used for interpreting the significant hubs, landmarks points of peer-reviewed literature on the context of ecological service research in recent 10 years. Secondly, 135 evidence-based EbA literature were reviewed for categorizing the methodologies and framework of evidence-based EbA by the systematic map protocol. Finally, a conceptual framework combined with culture, economic and social components was developed in order to assess the current adaptation strategies in Shanghai. This research founds that the key to reducing urban vulnerability does not only focus on co-benefit arguments but also should pay more attention to the concept of trade-off. This research concludes that the designed framework can provide key knowledge and indicates the essential gap as a valuable tool against climate variability in the process of urban adaptation in Shanghai.

Keywords: urban ecological-based adaptation, climate change, sustainable development, climate variability

Procedia PDF Downloads 143
1810 The Importance of Value Added Services Provided by Science and Technology Parks to Boost Entrepreneurship Ecosystem in Turkey

Authors: Faruk Inaltekin, Imran Gurakan

Abstract:

This paper will aim to discuss the importance of value-added services provided by Science and Technology Parks for entrepreneurship development in Turkey. Entrepreneurship is vital subject for all countries. It has not only fostered economic development but also promoted innovation at local and international levels. To foster high tech entrepreneurship ecosystem, Technopark (Science and Technology Park/STP) concept was initiated with the establishment of Silicon Valley in the 1950s. The success and rise of Silicon Valley led to the spread of technopark activities. Developed economies have been setting up projects to plan and build STPs since the 1960s and 1970s. To promote the establishment of STPs, necessary legislations were made by Ministry of Science, Industry, and Technology in 2001, Technology Development Zones Law (No. 4691) and it has been revised in 2016 to provide more supports. STPs’ basic aim is to provide customers high-quality office spaces with various 'value added services' such as business development, network connections, cooperation programs, investor/customers meetings and internationalization services. For this aim, STPs should help startups deal with difficulties in the early stages and to support mature companies’ export activities in the foreign market. STPs should support the production, commercialization and more significantly internationalization of technology-intensive business and foster growth of companies. Nowadays within this value-added services, internationalization is very popular subject in the world. Most of STPs design clusters or accelerator programs in order to support their companies in the foreign market penetration. If startups are not ready for international competition, STPs should help them to get ready for foreign market with training and mentoring sessions. These training and mentoring sessions should take a goal based approach to working with companies. Each company has different needs and goals. Therefore the definition of ‘success' varies for each company. For this reason, it is very important to create customized value added services to meet the needs of startups. After local supports, STPs should also be able to support their startups in foreign market. Organizing well defined international accelerator program plays an important role in this mission. Turkey is strategically placed between key markets in Europe, Russia, Central Asia and the Middle East. Its population is young and well educated. So both government agencies and the private sectors endeavor to foster and encourage entrepreneurship ecosystem with many supports. In sum, the task of technoparks with these and similar value added services is very important for developing entrepreneurship ecosystem. The priorities of all value added services are to identify the commercialization and growth obstacles faced by entrepreneurs and get rid of them with the one-to-one customized services. Also, in order to have a healthy startup ecosystem and create sustainable entrepreneurship, stakeholders (technoparks, incubators, accelerators, investors, universities, governmental organizations etc.) should fulfill their roles and/or duties and collaborate with each other. STPs play an important role as bridge for these stakeholders & entrepreneurs. STPs always should benchmark and renew services offered to how to help the start-ups to survive, develop their business and benefit from these stakeholders.

Keywords: accelerator, cluster, entrepreneurship, startup, technopark, value added services

Procedia PDF Downloads 130
1809 Entrepreneurship under the Effect of Information Technology

Authors: Mohammad Hadi Khorashadi Zadeh ‎

Abstract:

An entrepreneur is a manager or the owner of the commercial company that creates resources and money by risking and initiative. The Netpreneur is the capability to run an online business. It needs only the Connectivity. An Entrepreneur, as long as he has a service which the market demands can set up a feasible and viable trade with his Intellectual Capital as the principle input and the Connectivity Infrastructure as the only physical input. The internet is possibly the most significant revolution in science and technology that our generation could fantasize or imagine. It has introduced in various benefits to the society, culture, economics and politics. The entrepreneur is a premium member in the community. She/he provides services to the society and community including employment.

Keywords: entrepreneur, Netpreneur, intellectual capital, infrastructure

Procedia PDF Downloads 304
1808 The Effect of Information Technologies on Business Performance: An Application on Small Hotels

Authors: Abdullah Karaman, Kursad Sayin

Abstract:

In this research, which information technologies are used in small hotel businesses, and the information technologies-performance perception of the managers are pointed out. During the research, the questionnaire was prepared and the small scale hotel managers were interviewed face to face and they filled out the questionnaire and the answers acquired were evaluated. As the result of the research, it was obtained that the managers do not care much about the information technologies usage in practice even though they accepted that the information technologies are important in terms of performance.

Keywords: information technologies, managers, performance, small hotels

Procedia PDF Downloads 470
1807 Library Outreach After COVID: Making the Case for In-Person Library Visits

Authors: Lucas Berrini

Abstract:

Academic libraries have always struggled with engaging with students and faculty. Striking the balance between what the community needs and what the library can afford has also been a point of contention for libraries. As academia begins to return to a new normal after COVID, library staff are rethinking how remind patrons that the library is open and ready for business. NC Wesleyan, a small liberal arts school in eastern North Carolina, decided to be proactive and reach out to the academic community. After shutting down in 2020 for COVID, the campus library saw a marked decrease in in-person attendance. For a small school whose operational budget was tied directly to tuition payments, it was imperative for the library to remind faculty and staff that they were open for business. At the beginning of the Summer 2022 term and continuing into the fall, the reference team created a marketing plan using email, physical meetings, and virtual events targeted at students and faculty as well as community members who utilized the facilities prior to COVID. The email blasts were gentle reminders that the building was open and available for use The target audiences were the community at large. Several of the emails contained reminders of previous events in the library that were student centered. The next phase of the email campaign centers on reminding the community about the libraries physical and electronic resources, including the makerspace lab. Language will indicate that student voices are needed, and a QR code is included for students to leave feedback as to what they want to see in the library. The final phase of the email blasts were faculty focused and invited them to connect with library reference staff for an in-person consultation on their research needs. While this phase is ongoing, the response has been positive, and staff are compiling data in hopes of working with administration to implement some of the requested services and materials. These email blasts will be followed up by in-person meetings with faculty and students who responded to the QR codes. This research is ongoing. This type of targeted outreach is new for Wesleyan. It is the hope of the library that by the end of Fall 2022, there will be a plan in place to address the needs and concerns of the students and faculty. Furthermore, the staff hopes to create a new sense of community for the students and staff of the university.

Keywords: academic, education, libraries, outreach

Procedia PDF Downloads 76
1806 Drones, Rebels and Bombs: Explaining the Role of Private Security and Expertise in a Post-piratical Indian Ocean

Authors: Jessica Kate Simonds

Abstract:

The last successful hijacking perpetrated by Somali pirates in 2012 represented a critical turning point for the identity and brand of Indian Ocean (IO) insecurity, coined in this paper as the era of the post-piratical. This paper explores the broadening of the PMSC business model to account and contribute to the design of a new IO security environment that prioritises foreign and insurgency drone activity and Houthi rebel operations as the main threat to merchant shipping in the post-2012 era. This study is situated within a longer history of analysing maritime insecurity and also contributes a bespoke conceptual framework that understands the sea as a space that is produced and reproduced relative to existing and emerging threats to merchant shipping based on bespoke models of information sharing and intelligence acquisition. This paper also makes a prominent empirical contribution by drawing on a post-positivist methodology, data drawn from original semi-structured interviews with senior maritime insurers and active merchant seafarers that is triangulated with industry-produced guidance such as the BMP series as primary data sources. Each set is analysed through qualitative discourse and content analysis and supported by the quantitative data sets provided by the IMB Piracy Reporting center and intelligence networks. This analysis reveals that mechanisms such as the IGP&I Maritime Security Committee and intelligence divisions of PMSC’s have driven the exchanges of knowledge between land and sea and thus the reproduction of the maritime security environment through new regulations and guidance to account dones, rebels and bombs as the key challenges in the IO, beyond piracy. A contribution of this paper is the argument that experts who may not be in the highest-profile jobs are the architects of maritime insecurity based on their detailed knowledge and connections to vessels in transit. This paper shares the original insights of those who have served in critical decision making spaces to demonstrate that the development and refinement of industry produced deterrence guidance that has been accredited to the mitigation of piracy, have shaped new editions such as BMP 5 that now serve to frame a new security environment that prioritises the mitigation of risks from drones and WBEID’s from both state and insurgency risk groups. By highlighting the experiences and perspectives of key players on both land and at sea, the key finding of this paper is outlining that as pirates experienced a financial boom by profiteering from their bespoke business model during the peak of successful hijackings, the private security market encountered a similar level of financial success and guaranteed risk environment in which to prospect business. Thus, the reproduction of the Indian Ocean as a maritime security environment reflects a new found purpose for PMSC’s as part of the broader conglomerate of maritime insurers, regulators, shipowners and managers who continue to redirect the security consciousness and IO brand of insecurity.

Keywords: maritime security, private security, risk intelligence, political geography, international relations, political economy, maritime law, security studies

Procedia PDF Downloads 169
1805 The Neglected Elements of Implementing Strategic Succession Management in Public Organizations

Authors: François Chiocchio, Mahshid Gharibpour

Abstract:

Regardless of the extent to which succession management is implemented in the private sector, it is still overlooked in the public sector. Traditional succession management is evolving providing a better alignment between business strategies and HR strategies. Succession management brings sustainable effectiveness for succession programs through career path development, knowledge and skill transfer, job retention, as well as high-potential candidates’ empowerment for upcoming vacancies. By way of a systematic literature review, we bring into focus strategic succession management in public organizations and discuss best ways of implementation. 

Keywords: succession management, strategic succession management, public organization, succession management model

Procedia PDF Downloads 340
1804 Sustainability Study of Government Procurement of Public Services in Guangzhou: a Perspective Based on the Resources Dependence of Social Work

Authors: Li Pan

Abstract:

The recently prevalent government procurement of public services in China boasts a new form of government’s provision of public service through the purchasing of social work from social organizations, a new measure of the transformation in governmental functions as well as an unprecedented opportunity for the development of social organizations. For the past few years, the phenomenon of a surge in the number of social work organizations and social work staff emerged right with the initiatives of energetically carrying out the purchase of public services by the government. Such efforts have presented the strong determination of the Chinese government in building a small government by streamlining administration and delegating part of the governmental power to social organizations. This paper is based on the 2012-2014 performance appraisal project of the Guangzhou municipal government’s purchasing of public services and the project was carried out in the summer of 2015. During the process of the appraisal, several general problems hindering the sustainable development of government purchasing of public service have been observed. As Guangzhou is among the rank of pioneer cities in the conduct of the reform, it is representative and imperative to study the sustainability of government purchasing of public service. In 2012, Guangzhou local government started contracting out public service to the community social organizations to provide general family services and special services to community residents, since when integrated family service centers and special service centers were established as platforms to provide public social service in a city-wide range. Consequently, taking an example of the current rapid development of government purchase of the integrated family services and special services in Guangzhou, this paper puts up several proposals for the sustainable development of Guangzhou municipal government’s procurement of public services on the perspective of social work’s resource dependence.

Keywords: government procurement of public services, Guangzhou, integrated family service center, social work, sustainability.

Procedia PDF Downloads 246
1803 Governance Disclosure Quality and Cooperative Performance in Malaysia

Authors: Intan Waheedah Othman, Maslinawati Mohamad, Azizah Abdullah

Abstract:

Few discussions were made on cooperative governance reforms despite the fact that cooperative movements operate and compete in an identical business environment as the private as well as the public corporations. Due to the scarcity of research examining the issue of governance among cooperatives, this paper is motivated to examine the extent of governance compliance and disclosure among cooperatives, hence the relationship between cooperative governance and its firm performance. Results from the study provide empirical evidence that disclosure on ownership structure and exercise of control rights was found to have significant negative relationship with cooperative firm performance.

Keywords: cooperative, governance, firm performance, Malaysia

Procedia PDF Downloads 520
1802 A Multi-Regional Structural Path Analysis of Virtual Water Flows Caused by Coal Consumption in China

Authors: Cuiyang Feng, Xu Tang, Yi Jin

Abstract:

Coal is the most important primary energy source in China, which exerts a significant influence on the rapid economic growth. However, it makes the water resources to be a constraint on coal industry development, on account of the reverse geographical distribution between coal and water. To ease the pressure on water shortage, the ‘3 Red Lines’ water policies were announced by the Chinese government, and then ‘water for coal’ plan was added to that policies in 2013. This study utilized a structural path analysis (SPA) based on the multi-regional input-output table to quantify the virtual water flows caused by coal consumption in different stages. Results showed that the direct water input (the first stage) was the highest amount in all stages of coal consumption, accounting for approximately 30% of total virtual water content. Regional analysis demonstrated that virtual water trade alleviated the pressure on water use for coal consumption in water shortage areas, but the import of virtual water was not from the areas which are rich in water. Sectoral analysis indicated that the direct inputs from the sectors of ‘production and distribution of electric power and heat power’ and ‘Smelting and pressing of metals’ took up the major virtual water flows, while the sectors of ‘chemical industry’ and ‘manufacture of non-metallic mineral products’ importantly but indirectly consumed the water. With the population and economic growth in China, the water demand-and-supply gap in coal consumption would be more remarkable. In additional to water efficiency improvement measures, the central government should adjust the strategies of the virtual water trade to address local water scarcity issues. Water resource as the main constraints should be highly considered in coal policy to promote the sustainable development of the coal industry.

Keywords: coal consumption, multi-regional input-output model, structural path analysis, virtual water

Procedia PDF Downloads 289
1801 Impact of Cultural Intelligence on Decision Making Styles of Managers: A Turkish Case

Authors: Fusun Akdag

Abstract:

Today, as business becomes increasingly global, managers/leaders of multinational companies or local companies work with employees or customers from a variety of cultural backgrounds. To do this effectively, they need to develop cultural competence. Therefore, cultural intelligence (CQ) becomes a vitally important aptitude and skill, especially for leaders. The organizational success or failure depends upon the way, the kind of leadership which has been provided to its members. The culture we are born into deeply effects our values, beliefs, and behavior. Cultural intelligence (CQ) focuses on how well individuals can relate and work across cultures. CQ helps minimize conflict and maximize performance of a diverse workforce. The term 'decision,' refers to a commitment to a course of action that is intended to serve the interests and values of particular people. One dimension of culture that has received attention is individualism-collectivism or, independence-interdependence. These dimensions are associated with different conceptualizations of the 'self.' Individualistic cultures tend to value personal goal pursuit as opposed to pursuit of others’ goals. Collectivistic cultures, by contrast, view the 'self' as part of a whole. Each person is expected to work with his or her in-group toward goals, generally pursue group harmony. These differences underlie cross-cultural variation in decision-making, such as the decision modes people use, their preferences, negotiation styles, creativity, and more. The aim of this study is determining the effect of CQ on decision making styles of male and female managers in Turkey, an emergent economy framework. The survey is distributed to gather data from managers at various companies. The questionnaire consists of three parts: demographics, The Cultural Intelligence Scale (CQS) to measure the four dimensions of cultural intelligence and General Decision Making Style (GMDS) Inventory to measure the five subscales of decision making. The results will indicate the Turkish managers’ score at metacognitive, cognitive, motivational and behavioral aspects of cultural intelligence and to what extent these scores affect their rational, avoidant, dependent, intuitive and spontaneous decision making styles since business leaders make dozens of decisions every day that influence the success of the company and also having an impact on employees, customers, shareholders and the market.

Keywords: cultural intelligence, decision making, gender differences, management styles,

Procedia PDF Downloads 358
1800 Effects of Acupuncture Treatment in Gait Parameters in Parkinson's Disease

Authors: Catarina Isabel Ramos Pereira, Jorge Machado, Begona Alonso Criado, Maria João Santos

Abstract:

Introduction: Gait disorders are one of the symptoms that have severe implications on the quality of life in Parkinson's disease (PD). Currently, there is no therapy to reverse or treat this condition. None of the drugs used in conventional medical treatment is entirely efficient, and all have a high incidence of side effects. Acupuncture treatment is believed to improve motor ability, but there is still little scientific evidence in individuals with PD. Aim: The aim of the study is to investigate the acute effect of acupuncture on gait parameters in Parkinson's disease. Methods: This is a randomized and controlled crossover study. The same individual patient was part of both the experimental (real acupuncture) and control group (false acupuncture/sham), and the sequence was randomized. Gait parameters were measured at two different moments, before and after treatment, using four force platforms as well as the collection of 3D markers positions taken by 11 cameras. Images were quantitatively analyzed using Qualisys Track Manager software that let us extract data related to the quality of gait and balance. Seven patients with the diagnosis of Parkinson's disease were included in the study. Results: Statistically significant differences were found in gait speed (p = 0.016), gait cadence (p = 0.006), support base width (p = 0.0001), medio-lateral oscillation (p = 0.017), left-right step length (p = 0.0002), and stride length: right-right (p = 0.0000) and left-left (p = 0.0018), time of left support phase (p = 0.029), right support phase (p = 0.025) and double support phase (p = 0.015), between the initial and final moments for the experimental group. Differences in right-left stride length were found for both groups. Conclusion: Our results show that acupuncture could enhance gait in Parkinson's disease patients. Deep research involving a larger number of volunteers should be accomplished to validate these encouraging findings.

Keywords: acupuncture, traditional Chinese medicine, Parkinson's disease, gait

Procedia PDF Downloads 154
1799 Predictive Value of Hepatitis B Core-Related Antigen (HBcrAg) during Natural History of Hepatitis B Virus Infection

Authors: Yanhua Zhao, Yu Gou, Shu Feng, Dongdong Li, Chuanmin Tao

Abstract:

The natural history of HBV infection could experience immune tolerant (IT), immune clearance (IC), HBeAg-negative inactive/quienscent carrier (ENQ), and HBeAg-negative hepatitis (ENH). As current biomarkers for discriminating these four phases have some weaknesses, additional serological indicators are needed. Hepatits B core-related antigen (HBcrAg) encoded with precore/core gene contains denatured HBeAg, HBV core antigen (HBcAg) and a 22KDa precore protein (p22cr), which was demonstrated to have a close association with natural history of hepatitis B infection, but no specific cutoff values and diagnostic parameters to evaluate the diagnostic efficacy. This study aimed to clarify the distribution of HBcrAg levels and evaluate its diagnostic performance during the natural history of infection from a Western Chinese perspective. 294 samples collected from treatment-naïve chronic hepatitis B (CHB) patients in different phases (IT=64; IC=72; ENQ=100, and ENH=58). We detected the HBcrAg values and analyzed the relationship between HBcrAg and HBV DNA. HBsAg and other clinical parameters were quantitatively tested. HBcrAg levels of four phases were 9.30 log U/mL, 8.80 log U/mL, 3.00 log U/mL, and 5.10 logU/mL, respectively (p < 0.0001). Receiver operating characteristic curve analysis demonstrated that the area under curves (AUCs) of HBcrAg and quantitative HBsAg at cutoff values of 9.25 log U/mL and 4.355 log IU/mL for distinguishing IT from IC phases were 0.704 and 0.694, with sensitivity 76.39% and 59.72%, specificity 53.13% and 79.69%, respectively. AUCs of HBcrAg and quantitative HBsAg at cutoff values of 4.15 log U/mlmL and 2.395 log IU/mlmL for discriminating between ENQ and ENH phases were 0.931 and 0.653, with sensitivity 87.93% and 84%, specificity 91.38% and 39%, respectively. Therefore, HBcrAg levels varied significantly among four natural phases of HBV infection. It had higher predictive performance than quantitative HBsAg for distinguishing between ENQ-patients and ENH-patients and similar performance with HBsAg for the discrimination between IT and IC phases, which indicated that HBcrAg could be a potential serological marker for CHB.

Keywords: chronic hepatitis B, hepatitis B core-related antigen, hepatitis B surface antigens, hepatitis B virus

Procedia PDF Downloads 395
1798 Cybersecurity Awareness Among Applied Sciences Student Population

Authors: Sanja Bracun, Nikolina Kasunic

Abstract:

After graduation, the student population of applied sciences will become the population of employees on IT experts’ positions or "just" business users of certain IT technologies for which the level of awareness of existing cybersecurity risks is extremely important. This research results define the current cybersecurity awareness level of students at Zagreb University of Applied Sciences (TVZ), what can be useful not only for teaching staff to form a curriculum related to cybersecurity more accurately but also to employers to know what to expect from their future employees regarding cybersecurity awareness level.

Keywords: student population cybersecurity awareness, cybersecurity awareness, cybersecurity, applied sciences students

Procedia PDF Downloads 235
1797 Neoliberal Policies and International Organizations: The OECD and Higher Education Policy

Authors: Ellen Holtmaat

Abstract:

With an ever increasing influence of international organizations (IOs) on national policies and with the expectation that IOs are the transmission belts of world ideologies it is interesting to see to what extent IOs express a specific ideology and what determines the dominance of this ideology. This thesis looks at the OECD as IO and higher education as a field of policy. Evidence is found that the OECD promotes neoliberal developments in higher education and that its position is influenced by business, dominant countries and the dominant beliefs that are carried by the people working for the OECD that form an epistemic community. These results can possibly be extrapolated to other IOs.

Keywords: higher education, international organizations, neoliberal, OECD

Procedia PDF Downloads 355
1796 Verb Bias in Mandarin: The Corpus Based Study of Children

Authors: Jou-An Chung

Abstract:

The purpose of this study is to investigate the verb bias of the Mandarin verbs in children’s reading materials and provide the criteria for categorization. Verb bias varies cross-linguistically. As Mandarin and English are typological different, this study hopes to shed light on Mandarin verb bias with the use of corpus and provide thorough and detailed criteria for analysis. Moreover, this study focuses on children’s reading materials since it is a significant issue in understanding children’s sentence processing. Therefore, investigating verb bias of Mandarin verbs in children’s reading materials is also an important issue and can provide further insights into children’s sentence processing. The small corpus is built up for this study. The corpus consists of the collection of school textbooks and Mandarin Daily News for children. The files are then segmented and POS tagged by JiebaR (Chinese segmentation with R). For the ease of analysis, the one-word character verbs and intransitive verbs are excluded beforehand. The total of 20 high frequency verbs are hand-coded and are further categorized into one of the three types, namely DO type, SC type and other category. If the frequency of taking Other Type exceeds the threshold of 25%, the verb is excluded from the study. The results show that 10 verbs are direct object bias verbs, and six verbs are sentential complement bias verbs. The paired T-test was done to assure the statistical significance (p = 0.0001062 for DO bias verb, p=0.001149 for SC bias verb). The result has shown that in children’s reading materials, the DO biased verbs are used more than the SC bias verbs since the simplest structure of sentences is easier for children’s sentence comprehension or processing. In sum, this study not only discussed verb bias in child's reading materials but also provided basic coding criteria for verb bias analysis in Mandarin and underscored the role of context. Sentences are easier for children’s sentence comprehension or processing. In sum, this study not only discussed verb bias in child corpus, but also provided basic coding criteria for verb bias analysis in Mandarin and underscored the role of context.

Keywords: corpus linguistics, verb bias, child language, psycholinguistics

Procedia PDF Downloads 274
1795 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 351
1794 Effective Communication Within Workplace: Key to Growth of Business

Authors: Mamta

Abstract:

Communication is the mixture of the various activities such as words, body language, volume and voice tone. Mankind has always throughout its history had the necessity for communication. It starts from birth and continues throughout life. Communication is just the right means of success and advancement in a workplace. Communication is one of the means to connect to different people at far distances. The modern workplace is inherently collaborative, and this collaboration relies on effective communication among co-workers. Also it has been observed that a lack in good communication skills especially within a workplace can result in conflicts and chaos hence hindering the productivity of an organization. Thus there is a dire need for developing good and effective communication skills which will result in increase in productivity and will enhance its efficiency.

Keywords: communication skills, professional communication, workplace communication, workplace efficiency

Procedia PDF Downloads 439
1793 Cloud Design for Storing Large Amount of Data

Authors: M. Strémy, P. Závacký, P. Cuninka, M. Juhás

Abstract:

Main goal of this paper is to introduce our design of private cloud for storing large amount of data, especially pictures, and to provide good technological backend for data analysis based on parallel processing and business intelligence. We have tested hypervisors, cloud management tools, storage for storing all data and Hadoop to provide data analysis on unstructured data. Providing high availability, virtual network management, logical separation of projects and also rapid deployment of physical servers to our environment was also needed.

Keywords: cloud, glusterfs, hadoop, juju, kvm, maas, openstack, virtualization

Procedia PDF Downloads 340
1792 Factors Influencing the Usage of ERP in Enterprise Systems

Authors: Mohammad Reza Babaei, Sanaz Kamrani

Abstract:

The main problems That arise In adopting most Enterprise resources planning (ERP) strategies come from organizational, complex information systems like the ERP integrate the data of all business areas within the organization. The implementation of ERP is a difficult process as it involves different types of end users. Based on literature, we proposed a conceptual framework and examined it to find the effect of some of the individual, organizational, and technological factors on the usage of ERP and its impact on the end user. The results of the analysis suggest that computer self-efficacy, organizational support, training, and compatibility have a positive influence on ERP usage which in turn has significant influence on panoptic empowerment and individual performance.

Keywords: factor, influencing, enterprise, system

Procedia PDF Downloads 351
1791 Support of Knowledge Sharing in Manufacturing Companies: A Case Study

Authors: Zuzana Crhová, Karel Kolman, Drahomíra Pavelková

Abstract:

Knowledge is considered as an important asset which can help organizations to create competitive advantage. The necessity of taking care of these assets is more important in these days – in days of turbulent changes in business environment. Knowledge could facilitate adaption to constant changes. The aim of this paper is to describe how the knowledge sharing can be supported in the manufacturing companies. The methods of case studies and grounded theory were used to present information gained by carrying out semi-structured interviews. Results show that knowledge sharing is supported in very similar ways in respondent companies.

Keywords: case study, human resource management, knowledge, knowledge sharing

Procedia PDF Downloads 433
1790 Examining the Development of Complexity, Accuracy and Fluency in L2 Learners' Writing after L2 Instruction

Authors: Khaled Barkaoui

Abstract:

Research on second-language (L2) learning tends to focus on comparing students with different levels of proficiency at one point in time. However, to understand L2 development, we need more longitudinal research. In this study, we adopt a longitudinal approach to examine changes in three indicators of L2 ability, complexity, accuracy, and fluency (CAF), as reflected in the writing of L2 learners when writing on different tasks before and after a period L2 instruction. Each of 85 Chinese learners of English at three levels of English language proficiency responded to two writing tasks (independent and integrated) before and after nine months of English-language study in China. Each essay (N= 276) was analyzed in terms of numerous CAF indices using both computer coding and human rating: number of words written, number of errors per 100 words, ratings of error severity, global syntactic complexity (MLS), complexity by coordination (T/S), complexity by subordination (C/T), clausal complexity (MLC), phrasal complexity (NP density), syntactic variety, lexical density, lexical variation, lexical sophistication, and lexical bundles. Results were then compared statistically across tasks, L2 proficiency levels, and time. Overall, task type had significant effects on fluency and some syntactic complexity indices (complexity by coordination, structural variety, clausal complexity, phrase complexity) and lexical density, sophistication, and bundles, but not accuracy. L2 proficiency had significant effects on fluency, accuracy, and lexical variation, but not syntactic complexity. Finally, fluency, frequency of errors, but not accuracy ratings, syntactic complexity indices (clausal complexity, global complexity, complexity by subordination, phrase complexity, structural variety) and lexical complexity (lexical density, variation, and sophistication) exhibited significant changes after instruction, particularly for the independent task. We discuss the findings and their implications for assessment, instruction, and research on CAF in the context of L2 writing.

Keywords: second language writing, Fluency, accuracy, complexity, longitudinal

Procedia PDF Downloads 137
1789 Evaluating Gene-Gene Interaction among Nicotine Dependence Genes on the Risk of Oral Clefts

Authors: Mengying Wang, Dongjing Liu, Holger Schwender, Ping Wang, Hongping Zhu, Tao Wu, Terri H Beaty

Abstract:

Background: Maternal smoking is a recognized risk factor for nonsyndromic cleft lip with or without cleft palate (NSCL/P). It has been reported that the effect of maternal smoking on oral clefts is mediated through genes that influence nicotine dependence. The polymorphisms of cholinergic receptor nicotinic alpha (CHRNA) and beta (CHRNB) subunits genes have previously shown strong associations with nicotine dependence. Here, we attempted to investigate whether the above genes are associated with clefting risk through testing for potential gene-gene (G×G) and gene-environment (G×E) interaction. Methods: We selected 120 markers in 14 genes associated with nicotine dependence to conduct transmission disequilibrium tests among 806 Chinese NSCL/P case-parent trios ascertained in an international consortium which conducted a genome-wide association study (GWAS) of oral clefts. We applied Cordell’s method using “TRIO” package in R to explore G×G as well as G×E interaction involving environmental tobacco smoke (ETS) based on conditional logistic regression model. Results: while no SNP showed significant association with NSCL/P after Bonferroni correction, we found signals for G×G interaction between 10 pairs of SNPs in CHRNA3, CHRNA5, and CHRNB4 (p<10-8), among which the most significant interaction was found between RS3743077 (CHRNA3) and RS11636753 (CHRNB4, p<8.2×10-12). Linkage disequilibrium (LD) analysis revealed only low level of LD between these markers. However, there were no significant results for G×ETS interaction. Conclusion: This study fails to detect association between nicotine dependence genes and NSCL/P, but illustrates the importance of taking into account potential G×G interaction for genetic association analysis in NSCL/P. This study also suggests nicotine dependence genes should be considered as important candidate genes for NSCL/P in future studies.

Keywords: Gene-Gene Interaction, Maternal Smoking, Nicotine Dependence, Non-Syndromic Cleft Lip with or without Cleft Palate

Procedia PDF Downloads 323
1788 Income Generation and Employment Opportunity of the Entrepreneurs and Farmers Through Production, Processing, and Marketing of Medicinal Plants in Bangladesh

Authors: Md. Nuru Miah, A. F. M. Akhter Uddin

Abstract:

Medicinal plants are grown naturally in a tropical environment in Bangladesh and used as drug and therapeutic agents in the health care system. According to Bangladesh Agricultural Research Institute (BARI), there are 722 species of medicinal plants in the country. Of them, 255 plants are utilized by the manufacturers of Ayurvedic and Unani medicines. Medicinal plants like Aloevera, Ashwagonda, shotomul,Tulsi, Vuikumra, Misridana are extensively cultivated in some selected areas as well; where Aloevera scored the highest position in production. In the early 1980, Ayurvedic and Unani companies procured 80 percent of medicinal plants from natural forests, and the rest 20 percent was imported. Now the scenario has changed; 80 percent is imported, and the rest 20 percent is collected from local products(Source: Astudy on sectorbased need assessment of Business promotion council-Herbal products and medicinal plants, page-4). Uttara Development Program Society, a leading Non- Government development organization in Bangladesh, has been implementing a value chain development project under promoting Agricultural commercialization and Enterprises of Pally Karma Sahayak Foundation (PKSF) funded by the International Fund for Agricultural Development (IFAD) in Natore Sadar Upazila from April 2017 to sustainably develop the technological interventions for products and market development. The ultimate goal of the project is to increase income, generate employment and develop this sector as a sustainable business enterprise. Altogether 10,000 farmers (Nursery owners, growers, input supplier, processors, whole sellers, and retailers) are engaged in different activities of the project. The entrepreneurs engaged in medicinal plant cultivation did not know and follow environmental and good agricultural practices. They used to adopt traditional methodology in production and processing. Locally the farmers didn’t have any positive initiative to expand their business as well as developvalue added products. A lot of diversified products could be possible to develop and marketed with the introduction of post-harvest processing technology and market linkage with the local and global buyer. Training is imparted to the nursery owners and herbal growers on production technologies, sowing method, use of organic fertilizers/compost/pesticides, harvesting procedures, and storage facilities. Different types of herbal tea like Rosella, Moringa, Tulshi, and Basak are being produced and packed locally with a good scope of its marketing in different cities of the country. The project has been able to achieve a significant impact in the development of production technologies, but still, there is room for further improvement in processing, packaging, and marketing level. The core intervention of the current project to develop some entrepreneurs for branding, packaging, promotion, and marketing while considering environment friendly practices. The present strategies will strengthen the knowledge and skills of the entrepreneurs for the production and marketing of their products, maintaining worldwide accepted compliance system for easy access to the global market.

Keywords: aloe vera, herbs and shrubs, market, interventions

Procedia PDF Downloads 75
1787 CMMI Key Process Areas and FDD Practices

Authors: Rituraj Deka, Nomi Baruah

Abstract:

The development of information technology during the past few years resulted in designing of more and more complex software. The outsourcing of software development makes a higher requirement for the management of software development project. Various software enterprises follow various paths in their pursuit of excellence, applying various principles, methods and techniques along the way. The new research is proving that CMMI and Agile methodologies can benefit from using both methods within organizations with the potential to dramatically improve business performance. The paper describes a mapping between CMMI key process areas (KPAs) and Feature-Driven Development (FDD) communication perspective, so as to increase the understanding of how improvements can be made in the software development process.

Keywords: Agile, CMMI, FDD, KPAs

Procedia PDF Downloads 442
1786 Financial Inclusion in Indonesia and Its Challenges

Authors: Yen Sun, Pariang Siagian

Abstract:

The aim of this paper is to examine the progress of financial inclusion in Indonesia. The object of this paper is Micro Enterprises (MEs) and methodology used will be qualitative method by using surveys and questionnaires. The results show that there are still 20% MEs have no banking facilities at all and about 78% MEs still use their own capital to run their business. Furthermore, personal characteristics such as gender and education are factors that can explain financial inclusion. It is also said that in general MEs need banking product and services. However, there are still barriers that hinder them to be financially included. The most barriers they have to face are marketing exclusion. It shows that they have lack information about banking product and services since marketing strategy from bank is not disseminated clearly through various media.

Keywords: financial inclusion, financial exclusion, micro enterprises, Indonesia

Procedia PDF Downloads 383
1785 An Empirical Study on the Integration of Listening and Speaking Activities with Writing Instruction for Middles School English Language Learners

Authors: Xueyan Hu, Liwen Chen, Weilin He, Sujie Peng

Abstract:

Writing is an important but challenging skill For English language learners. Due to the small amount of time allocated for writing classes at schools, students have relatively few opportunities to practice writing in the classroom. While the practice of integrating listening and speaking activates with writing instruction has been used for adult English language learners, its application for young English learners has seldom been examined due to the challenge of listening and speaking activities for young English language learners. The study attempted to integrating integrating listening and speaking activities with writing instruction for middle school English language learners so as to improving their writing achievements and writing abilities in terms of the word use, coherence, and complexity in their writings. Guided by Gagne's information processing learning theory and memetics, this study conducted a 8-week writing instruction with an experimental class (n=44) and a control class (n=48) . Students in the experimental class participated in a series of listening and retelling activities about a writing sample the teacher used for writing instruction during each period of writing class. Students in the control class were taught traditionally with teachers’ direction instruction using the writing sample. Using the ANCOVA analysis of the scores of students’ writing, word-use, Chinese-English translation and the text structure, this study showed that the experimental writing instruction can significantly improve students’ writing performance. Compared with the students in the control class, the students in experimental class had significant better performance in word use and complexity in their essays. This study provides useful enlightenment for the teaching of English writing for middle school English language learners. Teachers can skillfully use information technology to integrate listening, speaking, and writing teaching, considering students’ language input and output. Teachers need to select suitable and excellent composition templates for students to ensure their high-quality language input.

Keywords: wring instruction, retelling, English language learners, listening and speaking

Procedia PDF Downloads 65
1784 Financial and Economic Crisis as a Challenge for Non-Derogatibility of Human Rights

Authors: Mirjana Dokmanovic

Abstract:

The paper will introduce main findings of the research of the responses of the Central European and South Eastern European (CEE/SEE) countries to the global economic and financial crisis in 2008 from human rights and gender perspectives. The research methodology included desk research and qualitative analysis of the available data, studies, statistics, and reports produced by the governments, the UN agencies, international financial institutions (IFIs) and international network of civil society organizations. The main conclusion of the study is that the governments in the region missed to assess the impacts of their anti-crisis policies both ex ante and ex post from the standpoint of human rights and gender equality. Majority of the countries have focused their efforts solely on prompting up the banking and financial sectors, and construction business sectors. The tremendous debt which the states have accumulated for the rescue of banks and industries lead to further cuts in social expenses and reduction of public services. Decreasing state support to health care and social protection and declining family incomes made social services unaffordable for many families. Thus, the economic and financial crisis stirred up the care crisis that was absorbed by women’s intensifying unpaid work within a family and household to manage household survival strategy. On the other hand, increased burden of the care work weakened the position of women in the labour market and their opportunities to find a job. The study indicates that the artificial separation of the real economy and the sphere of social reproduction still persist. This has created additional burden of unpaid work of women within a family. The aim of this paper is to introduce the lessons learnt for future: (a) human rights may not be derogated in the times of crisis; (b) the obligation of states to mitigate negative impacts of economic policies to population, particularly to vulnerable groups, must be prioritized; (c) IFIs and business sector must be liable as duty bearers with respect to human rights commitments.

Keywords: CEE/SEE region, global financial and economic crisis, international financial institutions, human rights commitments, principle of non-derogability of human rights

Procedia PDF Downloads 192
1783 [Keynote Speech]: Conceptual Design of a Short Take-Off and Landing (STOL) Light Sport Aircraft

Authors: Zamri Omar, Alifi Zainal Abidin

Abstract:

Although flying machines have made their tremendous technological advancement since the first successfully flight of the heavier-than-air aircraft, its benefits to the greater community are still belittled. One of the reasons for this drawback is due to the relatively high cost needed to fly on the typical light aircraft. A smaller and lighter plane, widely known as Light Sport Aircraft (LSA) has the potential to attract more people to actively participate in numerous flying activities, such as for recreational, business trips or other personal purposes. In this paper, we propose a new LSA design with some simple, yet important analysis required in the aircraft conceptual design stage.

Keywords: light sport aircraft, conceptual design, aircraft layout, aircraft

Procedia PDF Downloads 327
1782 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 387